Actionable Cyber Intel #118

Actionable Cyber Intel #118

Crush Your Week Like a Cyber Pro with Simply Cyber!

?-???? Gerald Auger, Ph.D. and Charles Sapp

Start your work week off at full speed with expert analysis and actionable intel from top cybersecurity news stories. Share with your End Users, Peers, and Executives to support weekly security awareness with Simply Cyber Newsletter!


FOR END USERS

How Phished Data Turns into Apple & Google Wallets.?Criminals are phishing for credit card info via messages disguised as USPS or toll roads, but sent through Apple iMessage/Google RCS. If you enter your card and a one-time code, they can add your card to their mobile wallet and steal your money via online or tap-to-pay fraud. Be wary of unexpected payment requests.

What you need to know:?For stronger user security habits, educate your end users to be highly suspicious of any unexpected messages asking for payments, even from seemingly known entities through messaging apps. Their safest first step is to independently verify such requests by contacting the official source directly (like the USPS website). End users should absolutely avoid entering personal or financial information in response to these unsolicited messages, and should contact their bank directly if they're unsure.

Below are some key points to use when reinforcing this message to end users:

? Scammers are sending fake messages that look like they're from USPS or toll roads through text message apps like iMessage or Google RCS to try and steal your payment information.

? If they click links in these messages and enter their credit card details AND the one-time code they receive, the scammers can add the card to their digital wallet and steal their money, even using 'ghost tap' technology.

? This is a serious and growing threat. Last year alone, scams like this caused an estimated $15 billion in fraudulent charges, showing how important it is to be cautious.

LISTEN TO MY TAKE

READ THE STORY

?

FOR?PEERS

CISA Warns of Palo Alto Firewall Vulnerability Actively Exploited in the Wild. Palo Alto Networks PAN-OS firewalls are under active exploitation due to a critical command injection vulnerability (CVE-2024-3400). Unauthenticated attackers can execute arbitrary code. Immediate patching and mitigation are crucial. Organizations using affected PAN-OS versions are at high risk of cyberattacks.

What you need to know:?For enhanced peer collaboration, have conversations with your peers to analyze the Huntress 2025 Cyber Threat Report. Focus discussions on data concerning faster TTR, RATs, and industry targeting to proactively update threat models and incident response plans. Specifically discuss report insights on 6hr TTR ransomware and sophisticated phishing evolutions. Brainstorm improved detection and rapid response techniques. Share best practices for mitigating hands-on attacks and containing data exfiltration. Collaboratively refine detection strategies, incident response, and data breach protocols leveraging report insights.

LISTEN TO MY TAKE

READ THE STORY

?

FOR EXECUTIVES

Chase will soon block Zelle payments to sellers on social media.?Chase is blocking Zelle payments to social media due to rampant fraud, highlighting risks from rushed security. A CFPB lawsuit reveals Zelle's hasty launch lacked safeguards, costing users $870M.

What you need to know:?This is a great reminder to share with your business executives that rushed security is a costly gamble. The Chase/Zelle case demonstrates that prioritizing rapid product launches over robust security creates significant business risks. The $870 million in losses and a CFPB lawsuit underscore the financial and regulatory fallout from the inadequate security safeguards. Cutting corners on security in the name of speed can lead to massive financial liabilities, reputational damage, and intense regulatory scrutiny. Investing in thorough security from the outset, even if it impacts timelines, is not just a technical necessity but a critical business imperative to protect the bottom line and long-term viability.

Lesson: Prioritizing speed over security in product development can lead to massive financial and reputational damage.

? LISTEN TO MY TAKE ?

?READ THE STORY

?

LET’S CONNECT

Stay current on trending topics, tips, events and resources in cybersecurity,?connect with Simply Cyber on socials?for new content, every day.

? CONNECT ON SOCIALS

As always, please send me feedback. Which tip above is your favorite? What do you want more or less of? Other suggestions? Please let me know. Just send a DM on X?with #actionableintel in the subject so I can find it.

Find more about what’s happening this week in the Simply Cyber community, below.

Thank you and see you again next time! Have a great week, #TeamSC!

Gerry

?

SIMPLY CYBER DAILY CYBER THREAT BRIEF

Catch the most popular weekday cyber threat news analysis livestream around and meet the most supportive community ever, #TeamSC!

Join us on the Daily Cyber Threat Brief happening every weekday morning at 8 AM EST via YouTube and?LinkedIn - podcast also available on?Spotify, Apple Podcasts, or your favorite podcast platform. You can also check it out on our podcast webpage.

Visit simplycyber.io/streams

?

SC MEDIA GROUP?SIMPLY DEFENSIVE PODCAST

When: Monday, February 24 at 9:30 AM ET | Presented by: Simply Cyber Media Group

S2 E7: Understanding Mac Security: Challenges and Insights with Slava Konstantinov

In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Slava Konstantinov, the Head of Mac Development at ThreatLocker. Slava dives deep into the world of Mac security, explaining the challenges and intricacies of developing security agents for macOS. We discuss the differences between Mac, Windows, and Linux security, the hurdles in defending Macs due to Apple's privacy measures, and the importance of zero trust security models. Slava also shares stories from his journey in cybersecurity, tips for defenders, and insights into current developments and future plans at ThreatLocker.

Don't miss this comprehensive discussion on modern Mac security.

Join us?at 9:30 AM EST on Monday after the Daily Cyber Threat Brief and Jaw Jackin’.

Join us for Season 2 of the Simply Defensive!

?

SC MEDIA GROUP?2 CYBER CHICKS SEASON 6

When: Wednesday, February 26 at 9:30 AM ET | Presented by: Simply Cyber Media Group

Erika McDuffie and Jax Scott are back and they’re thrilled to kick off the Season 6 premiere episode of 2 Cyber Chicks!

This season, we’re not just featuring top cybersecurity experts—we’re also bringing on industry leaders in leadership and professional development to give you a well-rounded perspective. A huge thank you to our Season 6 sponsor, ThreatLocker. If you missed it, be sure to check out our Season 5, Episode 3, where we chatted with Amanda from ThreatLocker’s Solutions Engineering team.

We love being part of the Simply Cyber community, and we can’t wait to share what’s in store this season!

Catch the premiere here and watch with #TeamSC every other Wednesday.

Click to set a reminder to attend!

?

SC MEDIA GROUP?CYBERSECURITY MENTORS PODCAST?

When: Thursday, February 27 at 9:30 AM ET | Presented by: Simply Cyber Media Group

S2 E8: Navigating Today's Job Market with Kelly Belding

This episode delves into the current state of the cybersecurity job market and offers essential strategies for breaking into the industry. Kelly Belding, an experienced IT recruiter, discusses hiring trends, the importance of relevant skills and certifications, and the significant role of networking for career advancement.

Join us for the final episode of Season 2 this Thursday after the Daily Cyber Threat Brief.

Join us for Season 2 of the Cybersecurity Mentors Podcast!

?

SIMPLY CYBER FIRESIDES?CYBER RECRUITMENT

When: Thursday, February 27 at 4:30 PM ET | Live on Simply Cyber

Simply Cyber Firesides is excited to host Paul Charles, experienced Cybersecurity Recruiter and Global Cyber Leader with a passion for placing people into the opportunities that fit them best.

Although he lives in Australia, Paul's reach is far beyond. With a trusted and respected reputation in cybersecurity recruitment, he is known for his stellar advice, applicable insights, and his constant activity helping others in the cyber community.

Paul also runs his own Discord server called, Cyber Jobs Hunting, with over 11,000 members worldwide! Join us for this episode where we catch up with Paul and find out how the state of cybersecurity jobs are in Australia, his thoughts on the future of cybersecurity hiring, and more.

Set your notifications and?join us LIVE on February 27?at 4:30 PM EST on YouTube and LinkedIn.

?

SC MEDIA GROUP WEEKLY STREAM SCHEDULE

?

SC ACADEMY?THE PLACE FOR CYBER CAREERS

At Simply Cyber Academy, we specialize in making GRC and Cybersecurity Careers a reality. Empower your career by learning real in-demand skills from cyber experts and the theory behind those skills with Simply Cyber Academy.

The popular GRC Analyst Master Class is a must for kickstarting your GRC Cybersecurity career. In addition, we have NEW COURSES - including a free course, Intro to Hacking with Tyler Ramsbey - available to help you advance in your Cyber career.

Visit?academy.simplycyber.io?to learn more now.

Subscribe to get the weekly newsletter!

Repost to share with your community!

Shout out to Charles Sapp and Kimberly McKnight for being Amazing!

Thanks

Gerry ??

要查看或添加评论,请登录

Simply Cyber的更多文章